Web Data Mining and Applications in Business Intelligence and Counter-Terrorism: 1st Edition (Hardback) book cover

Web Data Mining and Applications in Business Intelligence and Counter-Terrorism

1st Edition

By Bhavani Thuraisingham

CRC Press

544 pages | 373 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9780849314605
pub: 2003-06-26
SAVE ~$21.75
Currently out of stock
$145.00
$123.25
x
eBook (VitalSource) : 9780429210204
pub: 2003-06-26
from $28.98


FREE Standard Shipping!

Description

The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations. The emergence of data mining, and the larger field of Web mining, has businesses lost within a confusing maze of mechanisms and strategies for obtaining and managing crucial intelligence.

Web Data Mining and Applications in Business Intelligence and Counter-Terrorism responds by presenting a clear and comprehensive overview of Web mining, with emphasis on CRM and, for the first time, security and counter-terrorism applications. The tools and methods of Web mining are revealed in an easy-to-understand style, emphasizing the importance of practical, hands-on experience in the creation of successful e-business solutions.

The author, a program director for Data and Applications Security at the National Science Foundations, details how both opportunities and dangers on the Web can be identified and managed. Armed with the knowledge contained in this book, businesses can collect and analyze Web-based data to help develop customer relationships, increase sales, and identify existing and potential threats. Organizations can apply these same Web mining techniques to battle the real and present danger of terrorism, demonstrating Web mining's critical role in the intelligence arsenal.

Table of Contents

Introduction

Trends

Supporting Technologies for Web Data Mining

Web Data Mining Concepts

Web Data Mining and Counter-Terrorism

Organization of This Book

How Do We Proceed?

PART 1 SUPPORTING TECHNOLOGIES FOR WEB DATA MINING

WORLD WIDE WEB AND E-COMMERCE

Evolution of the Web

Introduction to E-Commerce

Relationship to Web Data Mining

Summary

DATA MINING

Data Mining Technologies

Concepts and Techniques in Data Mining

Directions and Trends in Data Mining

Relationship to Web Mining

Summary

CORE DATA MINING TECHNOLOGIES

Data Management and Data Warehousing

Statistical Reasoning

Machine Learning

Visualization

Parallel Processing

Decision Support

Architectural Support for Data Mining

Relationship to Web Data Mining

Summary

WEB DATABASE MANAGEMENT

Web Databases

Semi-Structured Databases

Metadata, Ontologies, and the Web

Distributed, Heterogeneous and Legacy Databases on the Web

Data Warehousing on the Web

Architectural Aspects

Relationship to Web Data Mining

Summary

INFORMATION RETRIEVAL SYSTEMS

Text Retrieval

Image Retrieval

Video Retrieval

Audio Retrieval

Multimedia Data and Information Management

Question Answering Systems

Markup Languages

Relationship to Web Data Mining

Summary

INFORMATION MANAGEMENT TECHNOLOGIES

Collaboration and Data Management

Knowledge Management

Agents for the Web

Training and Distance Learning

Wireless Information Management and Pervasive Computing

Sensor Information Management

Quality-Of-Service Aspects

Some Directions

Relationship to Web Data Mining

Summary

THE SEMANTIC WEB

Semantic Web Concepts

RDF

Role of Ontologies

Agents and the DAML Program

Semantic Web as a Database

XML, RDF, and Interoperability

Web Services

Note on E-Commerce and Semantic Web

Web versus the Semantic Web

Data Mining and the Semantic Web

Summary

PART 2 WEB DATA MINING TECHNIQUES, TOOLS, AND TRENDS

DATA MINING AND THE WEB

Mining Data on the Web

Mining Usage Patterns

Web Structure Mining

Applications and Directions

Summary

PROCESSES AND TECHNIQUES FOR WEB DATA MINING

Process of Web Data Mining

Web Data Mining Outcomes, Approaches, and Techniques

Web Data Mining versus Data Mining

Summary

MINING THE DATABASES ON THE WEB

Concepts in Web Database Mining

Mining Semi-Structured Databases

Metadata and Web Mining

Mining Distributed, Heterogeneous, Legacy, and Federated Databases on the Web

Architectures and Web Data Mining

Summary

INFORMATION RETRIEVAL AND WEB DATA MINING

Search Engines and Web Data Mining

Multimedia Data Mining and the Web

Some Other Aspects

Summary

INFORMATION MANAGEMENT AND WEB DATA MINING

Collaborative Data Mining

Knowledge Management and Web Data Mining

Training and Web Data Mining

Agents and Web Data Mining

Wireless Computing and Web Data Mining

Sensor Web Mining

Quality of Service and Web Data Mining

Other Aspects

Summary

SEMANTIC WEB MINING

Concepts In Semantic Web Mining

XML, RDF, and Web Data Mining

Ontologies and Web Data Mining

Agents and Web Data Mining

Web Mining and the Semantic Web as a Database

Semantic Interoperability and Web Mining

Web Services and Web Mining

Web Mining versus Semantic Web Mining

A Note on E-Commerce and Semantic Web Mining

Summary

MINING USAGE PATTERNS AND STRUCTURE ON THE WEB

Web Usage Mining Outcomes and Techniques

Web Usage Mining Analysis

CRM and Business Intelligence Applications

Mining Structure on the Web

Summary

PROTOTYPES, PRODUCTS, AND STANDARDS FOR WEB DATA MINING

Prototypes and Products for Data Mining

Web Data Mining Products

Standards for Web Mining

Summary

SOME APPLICATIONS FOR WEB MINING

E-Commerce And E-Business

Business Intelligence

Customer Relationship Management

Marketing and Sales

Enterprise Resource Management

Manufacturing and Planning

Education and Training

Telecommunications

Financial

Physical Sciences, Social Sciences, and Engineering

Medicine and Biotechnology

Counter-Terrorism

Summary

PART 3 WEB DATA MINING APPLICATIONS FOR COUNTER-TERRORISM

SOME INFORMATION ON TERRORISM, SECURITY THREATS, AND PROTECTION MEASURES

Natural Disasters and Human Errors

Non-Information Related Terrorism

Information Related Terrorism

Bio-Terrorism, Chemical, and Nuclear Attacks

Attacks on Critical Infrastructures

Non Real-Time Threats versus Real-Time Threats

Aspects of Counter-Terrorism

A Note on Privacy

Summary

WEB DATA MINING FOR COUNTER-TERRORISM

Web Data Mining for Counter-Terrorism

Analyzing the Techniques

Link Analysis

Summary

MINING THE WEB DATABASES FOR COUNTER-TERRORISM

Web Database Mining

Semi-Structured Database Mining

Metadata Mining

Warehouse Mining

Distributed and Heterogeneous Database Mining

Other Aspects

Summary

INFORMATION RETRIEVAL AND WEB MINING FOR COUNTER-TERRORISM

Exploiting and Using Intelligent Search Engines

Applying Multimedia Data Mining

Other Aspects

Summary

INFORMATION MANAGEMENT AND WEB MINING FOR COUNTER-TERRORISM

Collaborative Data Mining

Knowledge Management and Web Mining

Training and Web Mining

Agents and Web Mining

Wireless Information Management and Web Mining

Sensor Information Management and Web Mining

Quality of Service and Web Mining

Some Other Aspects

Summary

SEMANTIC WEB MINING FOR COUNTER-TERRORISM

Semantic Web Mining for Counter-Terrorism

Building the Semantic Web and Web Mining for Counter-Terrorism

Summary

WEB USAGE AND STRUCTURE MINING FOR COUNTER-TERRORISM

Web Usage Mining for Counter-Terrorism

Web Structure Mining for Counter-Terrorism

Summary

NATIONAL SECURITY, PRIVACY, CIVIL LIBERTIES, AND WEB MINING

Background on the Inference Problem

Mining, Warehousing, and Inference

Inductive Logic Programming and Inference

Privacy Issues

Inference Problem and Privacy

Privacy Enhanced Data Mining

Civil Liberties versus National Security

Summary

REVISITING SECURITY THREATS WITH RESPECT TO WEB MINING

Natural Disasters, Human Errors, and Malicious Attacks

Non-Information Related Terrorism

Information Related Terrorism

Bio-Terrorism, Chemical, and Nuclear Attacks

Attacks on Critical Infrastructures

Non-Realtime Threats versus Real-Time Threats

Revisiting Privacy

Summary

E-COMMERCE, BUSINESS INTELLIGENCE, AND COUNTER-TERRORISM

Models for Counter-Terrorism

Architectures for Counter-Terrorism

Functions for Counter-Terrorism

Revisiting Business Intelligence

Summary

SUMMARY AND DIRECTIONS

Summary of This Book

Challenges and Directions for Web Data Mining

Challenges and Directions for Web Data Mining for Counter-Terrorism

Impact of the Department of Homeland Security

Where Do We Go from Here?

PART 4 APPENDICES

DATA MANAGEMENT SYSTEMS: DEVELOPMENTS AND TRENDS

Developments in Database Systems

Status, Vision, and Issues

Data Management Systems Framework

Building Information Systems from the Framework

Relationship between the Texts

Summary

DATABASE SYSTEMS AND RELATED TECHNOLOGIES

Relational and Entity-Relationship Data Models

Architectural Issues

Database Design

Database Administration

Database Management System Functions

Distributed Databases

Heterogeneous Database Integration

Federated Databases

Client-Server Databases

Migrating Legacy Databases and Applications

Data Warehousing

Object Technology

Summary

DATA AND INFORMATION SECURITY

Access Control and Other Security Concepts

Secure Systems

Secure Database Systems

Emerging Trends

Impact of the Web

Summary

REFERENCES

Subject Categories

BISAC Subject Codes/Headings:
BUS083000
BUSINESS & ECONOMICS / Information Management
COM021030
COMPUTERS / Database Management / Data Mining
SOC004000
SOCIAL SCIENCE / Criminology